CARVE: Practical Security-Focused Software Debloating Using Simple Feature Set Mappings

被引:16
|
作者
Brown, Michael D. [1 ]
Pande, Santosh [1 ]
机构
[1] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
关键词
Software debloating; Protocol debloating; Security;
D O I
10.1145/3338502.3359764
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software debloating is an emerging field of study aimed at improving the security and performance of software by removing excess library code and features that are not needed by the end user (called bloat). Software bloat is pervasive, and several debloating techniques have been proposed to address this problem. While these techniques are effective at removing bloat, they are not practical for the average end user, risk creating unsound programs and introducing new vulnerabilities, and are not well suited for debloating complex software such as network protocol implementations. In this paper, we propose CARVE, a simple yet effective security-focused debloating technique that addresses these shortcomings. CARVE employs static source code annotation to map software features to source code, eliminating the need for advanced software analysis during debloating and reducing the overall level of technical sophistication required by the end user. CARVE also introduces the concept of debloating with replacement, which is capable of removing software features while preserving software interoperability and mitigating the risk of creating an unsound program or introducing a vulnerability. We evaluate CARVE in 12 debloating scenarios and present our results demonstrating security and performance improvements that meet or exceed those of existing techniques.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 4 条
  • [1] Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation
    Bonett, Richard
    Kafle, Kaushal
    Moran, Kevin
    Nadkarni, Adwait
    Poshyvanyk, Denys
    [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1263 - 1280
  • [2] A simple and practical approach for building lithography simulation models using a limited set of CD data and SEM pictures
    Wang, Yan
    Ho, Jonathan
    Lin, Benjamin
    Lin, C. -L.
    Sheng, Y. -C.
    Gong, Yoyi
    Hsu, Steven
    Wu, Kechih
    [J]. DESIGN FOR MANUFACTURABILITY THROUGH DESIGN-PROCESS INTEGRATION, 2007, 6521
  • [3] Malicious Software Detection based on URL-API Intensity Feature Selection Using Deep Spectral Neural Classification for Improving Host Security
    Lavanya, B.
    Shanthi, C.
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2023, 22 (02)
  • [4] Multi-modal compound biometric feature set security and person authentication using cancelable 2D color barcode pattern generation technique
    Rachapalli D.R.
    Kalluri H.K.
    [J]. International Journal of Information Technology, 2022, 14 (1) : 201 - 214